BitDefender Announces Identification of Guy Fawkes Virus

Security researchers at BitDefender came across a computer virus claimed to be affiliated by the infamous Anonymous hacktivist group in the Youtube long ago, reported softpedia on November 14, 2011.

In a blog by Razvan Livintz, an E-Threats Analyst at BitDefender in the site theinquirer.net on November 14, 2011, there were claims of revealing a malware, which was later on came to be known as backdoor-Bifrose-AAJX.

Similar to the Guy Fawkes code, this software was first marked in the beginning of July 2011, tallying with the statement from Anonymous that the malware could be utilized to create massive havoc at Facebook.

However, as reported by Livintz, on the same day a scam purporting to offer an additional feature in Facebook "New Facebook Video Chat with Voice Features", came up. As Livintz claimed, a click to the link by an ignorant user will lead towards downloading an archive named scan_facebook.zip

As claimed by the hacktivists, the virus, Backdoor-Bifrose-AAJX is sophisticated to take over a compromised system incessantly. Installation of the virus on the computer enables it to harm the system at large by injecting itself in IE process, providing a remote attacker unhindered access to the compromised system, recording keystrokes, and killing several processes of known antimalware solutions, if installed on the computer. Nonetheless, the video forgot to mention the self-replication component as it does connect to a remote server in Egypt instead

An ingeniously designed computer worm is enabled to infect the devices of innumerable social network customers, particularly for those without an appropriate secured anti virus installation on their devises.

As BitDefender speculates, as this threat maintains a low profile and stands nowhere close to the capabilities described by Anonymous, there exists two main credible scenarios.

Thus, it implicates two probabilities. The first signifies that the though the virus exists in the social network, it does not spread vulnerabilities as acclaimed and second that there actually exists no such computer worm at all.

However, the plausibility implicates that the experts would further keep a closed monitoring and reviewing of the virus activities further. Though at the same time, it is also recommended that the virus definition database is well maintained and up-to-dated with a strict monitoring on any such harmful maneuverings.